Lecture preparation

Before lecture, read the paper assigned below, and submit two items to the submission website:

Also keep in mind that you will need to write a paper summary for your choice of papers throughout the semester.


Read the paper Komodo: Using verification to disentangle secure-enclave hardware from software by Ferraiuolo et al.

Why are we reading this paper?

What to learn from this paper?

Answer this question

What would happen if a malicious OS tried to map the same physical page of memory into two different enclaves?